Papers by Emmanuel Olajubu

Journal of Computing and Information Technology, 2011
This paper presents the performance comparison of Lightweight Agents, Single Mobile Intelligent A... more This paper presents the performance comparison of Lightweight Agents, Single Mobile Intelligent Agents and Remote Procedure Call which are tools for implementing communication in a distributed computing environment. Routing algorithms for each scheme is modeled based on TSP. The performance comparison among the three schemes is based on bandwidth overhead with retransmission, system throughput and system latency. The mathematical model for each performance metric is presented, from which mathematical model is derived for each scheme for comparison. The simulation results show that the LWAs has better performance than the other two schemes in terms of small bandwidth retransmission overhead, high system throughput and low system latency. The Bernoulli random variable is used to model the failure rate of the simulated network which is assumed to have probability of success p = 85% and the probability of failure q = 15%. The network availability is realized by multiplicative pseudorandom number generator during the simulation. The results of simulation are presented.

Trust: A Requirement for Cloud Technology Adoption
Abstract—Cloud computing is a recent model for enabling convenient, on-demand network access to a... more Abstract—Cloud computing is a recent model for enabling convenient, on-demand network access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services; that can be rapidly provisioned and released with minimal management effort or service provider interaction. Studies have shown that cloud computing has the potential to benefit establishments, industries, national and international economies. Despite the enormous benefits cloud computing technology has the potentials of offering, several issues are making intended users to pause in adopting the usage of the technology. Users need to be assured of the safety and reliability of the technology while using it. This is needed to build confidence around the technology and reduce the level of anxiety. This research attempts to investigate the effect of trust in the adoption of the technology by formulating a trust model based on Expectancy Disconfirmation Theory model and Bayesian n...
International Journal of Healthcare Information Systems and Informatics
Telemedicine is the use of information and communication technologies to extend healthcare work t... more Telemedicine is the use of information and communication technologies to extend healthcare work to the vulnerable in the rural areas. It is unfortunate that telemedicine is yet to be deployed in sub Sahara Africa where there is acute shortage of medical professionals with many rural dwellers without medical facilities. This paper proposes an electronic Patient’s Case-Note to replace existing manual method so as to mitigate the challenges associated with manual record keeping. The tree theory was used to motivate the information follows which the basis for the theoretical framework for the study also presented is the Cyclic structure that depicts information flow in the system. The conceptual model and the algorithms to implement the model are presented. The Model was implemented and few screenshot presented.

A Mobile Agent Based Proactive Hardware Fault Monitoring on a Grid Computational Platform
Journal of Communication and Computer, 2010
Proactive faulting monitoring is one of the crucial issues challenging grid computing platform pe... more Proactive faulting monitoring is one of the crucial issues challenging grid computing platform performance. Existing fault monitoring models frequently proposed for grid computing platform5 are mostly reactive. The5e model5 only react to faults after the hardware fault has been manifested. Therefore, a proactive hardware fault monitoring on a grid computational infrastructure is presented through the use of mobile agents. The routing model of the mobile agents that collect and collate components status information is based on Traveling Salesman Problems (TSP) concept 50 as minimize network resources usage. The presented system architecture consists of two modules: The Main Host and substation. Two hardware devices (CPU and HDD) which are highly vulnerable to crashes on grid are considered. The system alerts the network engineer of any impending crash and suggests possible solution.
Today, increasingly complex control problems abound, for which mathematical modelling representat... more Today, increasingly complex control problems abound, for which mathematical modelling representations may be difficult to obtain. This study relied on the reported strength of the fuzzy logic technique in controlling highly nonlinear systems to improve the user perceived Quality of Service (QoS) of the web application. The fuzzy logic based QoS broker model was designed, modelled, and simulated using MATLAB 7.0; its performance was evaluated using two QoS parameters: Response time and throughput. The simulation results revealed an increase in throughput as well as a reduction in response times perceived by the clients.

Nigerian Journal of Technology
In ambient intelligence home networks, attacks can be on the home devices or the communication ch... more In ambient intelligence home networks, attacks can be on the home devices or the communication channel. This paper focuses on the channel attacks prevention by proposing Real Time Dynamic Source Routing (RTDSR) protocol. The protocol adopted the observation based cooperation enforcement in ad hoc networks (oceans) and collaborative reputation mechanism built on Dynamic Source Routing (DSR) protocol. The RTDSR introduced lookup table on the source, destination and intermediate nodes. It also ensures that data path with high reputation are used for data routing and a monitoring watchdog was introduced to ensure that the next node forward the packet properly. The RTDSR protocol was simulated and benchmarked with DSR protocol considering network throughput, average delay, routing overhead and response time as performance metrics. Simulation result revealed a better performance of RTDSR protocol over existing DSR protocol.

Journal of Information Technology Education: Innovations in Practice
Aim/Purpose: The study examined types of errors made by novice programmers in different Java conc... more Aim/Purpose: The study examined types of errors made by novice programmers in different Java concepts with students of different ability levels in programming as well as the perceived causes of such errors. Background: To improve code writing and debugging skills, efforts have been made to taxonomize programming errors and their causes. However, most of the studies employed omnibus approaches, i.e. without consideration of different programing concepts and ability levels of the trainee programmers. Such concepts and ability specific errors identification and classifications are needed to advance appropriate intervention strategy. Methodology: A sequential exploratory mixed method design was adopted. The sample was an intact class of 124 Computer Science and Engineering undergraduate students grouped into three achievement levels based on first semester performance in a Java programming course. The submitted codes in the course of second semester exercises were analyzed for possible ...

International Journal of Information Communication Technologies and Human Development
Rapid industrialization has contributed immensely to the discharge of heavy metals into receiving... more Rapid industrialization has contributed immensely to the discharge of heavy metals into receiving water bodies untreated. The quantity of heavy metals prediction in industrial wastewater is very essential before treatment so that the quantity is precisely removed. This article formulates, simulate and evaluate a predictive model that mimics electrochemical treatment of lead and cadmium ions present in paint industrial wastewater using artificial neural network. The predictive model was formulated using Fuzzy Logic toolbox in MATLAB and the simulation was done in the environment. The prediction of the model was evaluated by comparing the predicted quantity of lead ions and cadmium ions with the result of the experimental work in the laboratory. The article concludes that the developed prediction model demonstrated very high prediction accuracy in predicting the percentage of lead and cadmium ions present in paints wastewater.
Channel estimation is an important and necessary function performed by modern wireless receivers.... more Channel estimation is an important and necessary function performed by modern wireless receivers. The goal of channel estimation is to measure the effects of the channel on known or partially known transmission. The usual practice in acquiring knowledge about a channel is to model the channel and then acquire the parameters involved in the model. This paper proposes a variable partial update model for adaptive communication channel estimation with a view to improving signal error at the receiver station. The proposed model is composed of finite impulse response transversal adaptive filter and least mean square adaptation algorithm. The performance of the proposed model was compared with the full update model. The evaluation results indicated that the proposed model performed better than the full update model in terms of computational complexity, memory load, and convergence rate.

International Journal of Advanced Pervasive and Ubiquitous Computing, 2014
This article developed a framework for trust management in mobile ambient home network with a vie... more This article developed a framework for trust management in mobile ambient home network with a view to secure the home devices and channel against attacks. The framework was design using mobile ad hoc network and social networking concept. The trust management, global reputation aggregation which considered the direct and indirect communication of home devices and remote devices was employed to shield home devices from attacks. While real time dynamic source routing protocol was employed to prevent the channel from attacks by selfish and malicious nodes. The prototype of the framework was implemented using C# programming language. The framework will enhance the activities in the home by securing the home network against unforeseen network disruption and node misbehavior due to the distributed nature of the environment.

Journal of Information Technology Education: Innovations in Practice
This study presents a cost effective, reliable, and convenient mobile web-based system to facilit... more This study presents a cost effective, reliable, and convenient mobile web-based system to facilitate the dissemination of course information to students, to support interaction that goes beyond the classroom. The system employed the Really Simple Syndication (RSS) technology and was developed using Rapid Application Development (RAD) methodology. The design of the system was modeled using Unified Modeling Language (UML) diagrams, while its implementation was done using Java Micro Edition (JME) and "PHP: Hypertext Preprocessor" (PHP). A simulation technique was used to evaluate the proposed system performance by comparing the approach used in its design to one adopted in a similar study, using response time and bandwidth consumption as metrics. The results obtained revealed that the performance of the proposed syndication system was better. Similarly, an experiment to investigate the students' perception of the system was conducted, with students' responses revealing a tremendous success of this project.

International Journal of Information Technology and Computer Science
Olympic Games are international field and track events hosted within four years periods. Like oth... more Olympic Games are international field and track events hosted within four years periods. Like other events, sprinting is a track event that requires rigorous and focused training. When training is done with little or no understanding of the possibilities of the games, the competition would leave more to be desired. This paper formulates, evaluates and validates a model for predicting the fastest sprinting time of Olympic athletes of 100m race for a-5 season appearances. Dataset was obtained from the Olympic official records of world best performances, typically Gold medalists in sprint for the male category from the inception in 1896 to the 2016 edition. The model was simulated on MATLAB. Crossvalidation was done using residuals for whiteness and independence tests and model outputs. The results were evaluated based on Sum of Square Error (SSE), R-Square, adjusted R-Square, and Root Mean Square Error (RMSE) and benchmarked with existing models. The model outperformed the existing models with higher accuracy and goodness of fit. This prediction is a reasonable guide for predictive training, forecasting and future study on predictive algorithms.

An Enhanced Mobile Device-Based Navigation Model
International Journal of Mobile Computing and Multimedia Communications
This article formulated, simulated and evaluated an enhanced model for a non-linear/non-Gaussian ... more This article formulated, simulated and evaluated an enhanced model for a non-linear/non-Gaussian integrated Global Positioning System (GPS) and Inertial Navigation System (INS) mobile-based device navigation system using the Particle Filter (PF). This was with a view to enhancing the accuracy and minimize the delay experienced in the existing system which relies on linear data. An android driven Infinix X5 mobile device with GPS and INS-based sensors was used to implement the model formulated, standard Bayesian estimators were used to generate non-linear datasets with Gaussian/non-Gaussian white noises for mobile device based INS/GPS sensors. A mathematical model was formulated using Sampling Importance-weight Resampling (SIR) algorithm of the PF. The conceptual model was developed using Simulink and the design specification was done using Unified Modeling Language (UML). The model was simulated with MATLAB and the simulation results obtained were evaluated using standard metrics, a...

South African Journal of Information and Communication
Global connectivity has greatly enhanced communication, collaboration and the exchange of ideas a... more Global connectivity has greatly enhanced communication, collaboration and the exchange of ideas and information. The Internet, which came into existence as a tool for research collaboration among academics and research institutions, has now become an important tool in the commercial arena, with little impact on academics in the developing world. The impact/importance of Internet cannot be underestimated for citadels of learning, especially in the tertiary academic environment. According to the African Association of Universities, (2000), such use includes: Support of Higher Educational Institutions' (HEI) core process of teaching and learning through a provision of contents that form a tool to enhance learning and prepare students for the labour market. The advantage is further demonstrated in that it supports teaching methodology, management and monitoring of the teaching and learning process. Support of HEI's core process of research which includes collection, exchange and dissemination of academic information in support of research and management of research projects. Support of HEI's core process of academic information services. Transformation of the library from the traditional book-oriented approach to an outward-looking one, with emphasis on information handling (not only cataloguing information) but in fact collecting, processing, compiling and disseminating it in support of students and researchers inside and outside the institution. Support of administration and operational management. Support of tactical and strategic management of Information and Communication Technology (ICT) technical organisational infrastructure. Therefore, that institutions of higher education such as the universities and polytechnics should have a networking facility such as Local Area Networks and connection to the Internet must be expected. In this spirit, academic institutions in developing countries of Africa are getting connected to the Internet for teaching and research purposes.

A Trust Model for Detecting Device Attacks in Mobile Ad Hoc Ambient Home Network
International Journal of Advanced Pervasive and Ubiquitous Computing
This study designed, simulated and evaluated the performance of a conceptual framework for ambien... more This study designed, simulated and evaluated the performance of a conceptual framework for ambient ad hoc home network. This was with a view to detecting malicious nodes and securing the home devices against attacks. The proposed framework, called mobile ambient social trust consists of mobile devices and mobile ad hoc network as communication channel. The trust model for the device attacks is Adaptive Neuro Fuzzy (ANF) that considered global reputation of the direct and indirect communication of home devices and remote devices. The model was simulated using Matlab 7.0. In the simulation, NSL-KDD dataset was used as input packets, the artificial neural network for packet classification and ANF system for the global trust computation. The proposed model was benchmarked with an existing Eigen Trust (ET) model using detection accuracy and convergence time as performance metrics. The simulation results using the above parameters revealed a better performance of the ANF over ET model. Th...

Cogent Engineering, 2016
Accessing the advantages of cloud computing requires that a prospective user has proper access to... more Accessing the advantages of cloud computing requires that a prospective user has proper access to trustworthy cloud services. It is a strenuous and laborious task to find resources and services in a heterogeneous network such as cloud environment. The cloud computing paradigm being a form of distributed system with a complex collection of computing resources from different domains with different regulatory policies but having a lot of values could enhance the mode of computing. However, a monolithic approach to cloud service discovery cannot help the necessities of cloud environment efficiently. This study put forward a distributive approach for finding sincere cloud services with the use of Multi-Agents System for ensuring intelligent cloud service discovery from trusted providers. Experiments were carried out in the study using CloudAnalyst and the results indicated that extending the frontiers MAS approach into cloud service discovery by way of integrating trust into the process improves the quality of service in respect of response time and scalability. A further comparative analysis of the Multi-Agents System approach for cloud service discovery to monolithic approach showed that Multi-Agents System approach is highly efficient, and highly flexible for trustworthy cloud service discovery.

Computer Science, 2016
The study formulated and evaluated a model for effective management of malicious nodes in mobile ... more The study formulated and evaluated a model for effective management of malicious nodes in mobile Ad-hoc network based on Ad-Hoc on-demand distance vector routing protocol. A collaborative injection model called Collaborative Injection Deterrence Model (CIDM) was formulated using stochastic theory. The definition of the model was presented using graph theory. CIDM was simulated using three different scenarios. The three scenarios were then compared using packets delivery ratio (PDR), routing load, throughput and delay as performance metrics. The simulation result showed that CIDM reduce considerably the rate of packets dropped caused by malicious nodes in MANET network. CIDM did not introduce additional load to the network and yet with produce higher throughput. Lastly, the access delay with CIDM is minimal compared with convectional OADV. The study developed a model to mete out a punitive measure to rogue nodes as a form of intrusion deterrence without degrading the overall performance of the network. The well known CRAWDAD dataset was used in the simulation.
Wireless DataProcessing Model in Hospital Environment : A Case Study of Obafemi Awolowo University Teaching Hospital

International Journal of Advanced Computer Science and Applications, 2015
Cloud computing is a recent model for enabling convenient, on-demand network access to a shared p... more Cloud computing is a recent model for enabling convenient, on-demand network access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services; that can be rapidly provisioned and released with minimal management effort or service provider interaction. Studies have shown that cloud computing has the potential to benefit establishments, industries, national and international economies. Despite the enormous benefits cloud computing technology has the potentials of offering, several issues are making intended users to pause in adopting the usage of the technology. Users need to be assured of the safety and reliability of the technology while using it. This is needed to build confidence around the technology and reduce the level of anxiety. This research attempts to investigate the effect of trust in the adoption of the technology by formulating a trust model based on Expectancy Disconfirmation Theory model and Bayesian network. A simulation experiment was carried out to determine the significance of trust in the adoption of cloud technology.
Economic Path Scheduling for Mobile Agent System on Computer Network
Advanced Techniques in Computing Sciences and Software Engineering, 2009
... result, it is important that agent's path scheduling are properly ordered so as to enjoy... more ... result, it is important that agent's path scheduling are properly ordered so as to enjoy the maximumadvantages promised by ... [15]http://www.csse.monash.edu.au/courseware/cse314 2 ... ECONOMIC PATH SCHEDULING FOR MOBILE AGENT SYSTEM ON COMPUTER NETWORK ...
Uploads
Papers by Emmanuel Olajubu